
Addison-Wesley Software Security: Enterprise Software Security : A Confluence of Disciplines (Paperback)
(No ratings yet)
Key item features
STRENGTHEN SOFTWARE SECURITY BY HELPING DEVELOPERS AND SECURITY EXPERTS WORK TOGETHER Traditional approaches to securing software are inadequate. The solution: Bring software engineering and network security teams together in a new, holistic approach to protecting the entire enterprise. Now, four highly respected security experts explain why this "confluence" is so crucial, and show how to implement it in your organization. Writing for all software and security practitioners and leaders, they show how software can play a vital, active role in protecting your organization. You'll learn how to construct software that actively safeguards sensitive data and business processes and contributes to intrusion detection/response in sophisticated new ways. The authors cover the entire development lifecycle, including project inception, design, implementation, testing, deployment, operation, and maintenance. They also provide a full chapter of advice specifically for Chief Information Security Officers and other enterprise security executives.
Whatever your software security responsibilities, Enterprise Software Security delivers indispensable big-picture guidance-and specific, high-value recommendations you can apply right now. COVERAGE INCLUDES:
- Overcoming common obstacles to collaboration between developers and IT security professionals
- Helping programmers design, write, deploy, and operate more secure software
- Helping network security engineers use application output more effectively
- Organizing a software security team before you've even created requirements
- Avoiding the unmanageable complexity and inherent flaws of layered security
- Implementing positive software design practices and identifying security defects in existing designs
- Teaming to improve code reviews, clarify attack scenarios associated with vulnerable code, and validate positive compliance
- Moving beyond pentesting toward more comprehensive security testing
- Integrating your new application with your existing security infrastructure
- "Ruggedizing" DevOps by adding infosec to the relationship between development and operations
- Protecting application security during maintenance
Whatever your software security responsibilities, Enterprise Software Security delivers indispensable big-picture guidance-and specific, high-value recommendations you can apply right now. COVERAGE INCLUDES:
- Overcoming common obstacles to collaboration between developers and IT security professionals
- Helping programmers design, write, deploy, and operate more secure software
- Helping network security engineers use application output more effectively
- Organizing a software security team before you've even created requirements
- Avoiding the unmanageable complexity and inherent flaws of layered security
- Implementing positive software design practices and identifying security defects in existing designs
- Teaming to improve code reviews, clarify attack scenarios associated with vulnerable code, and validate positive compliance
- Moving beyond pentesting toward more comprehensive security testing
- Integrating your new application with your existing security infrastructure
- "Ruggedizing" DevOps by adding infosec to the relationship between development and operations
- Protecting application security during maintenance
Specs
- Book formatPaperback
- Fiction/nonfictionNon-Fiction
- GenreComputing & Internet
- Publication dateDecember, 2014
- Pages320
- PublisherAddisonWesley Professional
Current price is USD$45.79
Price when purchased online
Out of stock
How do you want your item?
Out of stock
About this item
Product details
STRENGTHEN SOFTWARE SECURITY BY HELPING DEVELOPERS AND SECURITY EXPERTS WORK TOGETHER Traditional approaches to securing software are inadequate. The solution: Bring software engineering and network security teams together in a new, holistic approach to protecting the entire enterprise. Now, four highly respected security experts explain why this "confluence" is so crucial, and show how to implement it in your organization. Writing for all software and security practitioners and leaders, they show how software can play a vital, active role in protecting your organization. You'll learn how to construct software that actively safeguards sensitive data and business processes and contributes to intrusion detection/response in sophisticated new ways. The authors cover the entire development lifecycle, including project inception, design, implementation, testing, deployment, operation, and maintenance. They also provide a full chapter of advice specifically for Chief Information Security Officers and other enterprise security executives.
Whatever your software security responsibilities, Enterprise Software Security delivers indispensable big-picture guidance-and specific, high-value recommendations you can apply right now. COVERAGE INCLUDES:
- Overcoming common obstacles to collaboration between developers and IT security professionals
- Helping programmers design, write, deploy, and operate more secure software
- Helping network security engineers use application output more effectively
- Organizing a software security team before you've even created requirements
- Avoiding the unmanageable complexity and inherent flaws of layered security
- Implementing positive software design practices and identifying security defects in existing designs
- Teaming to improve code reviews, clarify attack scenarios associated with vulnerable code, and validate positive compliance
- Moving beyond pentesting toward more comprehensive security testing
- Integrating your new application with your existing security infrastructure
- "Ruggedizing" DevOps by adding infosec to the relationship between development and operations
- Protecting application security during maintenance
Whatever your software security responsibilities, Enterprise Software Security delivers indispensable big-picture guidance-and specific, high-value recommendations you can apply right now. COVERAGE INCLUDES:
- Overcoming common obstacles to collaboration between developers and IT security professionals
- Helping programmers design, write, deploy, and operate more secure software
- Helping network security engineers use application output more effectively
- Organizing a software security team before you've even created requirements
- Avoiding the unmanageable complexity and inherent flaws of layered security
- Implementing positive software design practices and identifying security defects in existing designs
- Teaming to improve code reviews, clarify attack scenarios associated with vulnerable code, and validate positive compliance
- Moving beyond pentesting toward more comprehensive security testing
- Integrating your new application with your existing security infrastructure
- "Ruggedizing" DevOps by adding infosec to the relationship between development and operations
- Protecting application security during maintenance
info:
We aim to show you accurate product information. Manufacturers, suppliers and others provide what you see here, and we have not verified it. Â
Specifications
Book format
Paperback
Fiction/nonfiction
Non-Fiction
Genre
Computing & Internet
Publication date
December, 2014
Warranty
Warranty information
Please be aware that the warranty terms on items offered for sale by third party Marketplace sellers may differ from those displayed in this section (if any). To confirm warranty terms on an item offered for sale by a third party Marketplace seller, please use the 'Contact seller' feature on the third party Marketplace seller's information page and request the item's warranty terms prior to purchase.
Similar items you might like
Based on what customers bought
Dan Vega,Nathaniel Schut Fundamentals of Software Engineering: From Coder to Engine (Paperback) $45.30
$4530current price $45.30Dan Vega,Nathaniel Schut Fundamentals of Software Engineering: From Coder to Engine (Paperback)
Understanding Welfare: Social Issues, Po Understanding Social Security: Issues for Policy and Practice, (Paperback) $49.22
$4922current price $49.22Understanding Welfare: Social Issues, Po Understanding Social Security: Issues for Policy and Practice, (Paperback)
Sigs: Managing Object Technology Component-Based Development for Enterprise Systems, Book 13, (Paperback) $71.20
$7120current price $71.20Sigs: Managing Object Technology Component-Based Development for Enterprise Systems, Book 13, (Paperback)
Building an Intelligence-Led Security Program, (Paperback) $79.86
$7986current price $79.86Building an Intelligence-Led Security Program, (Paperback)
Embedded Software Development for Safety-Critical Systems, (Paperback) $51.19
$5119current price $51.19Embedded Software Development for Safety-Critical Systems, (Paperback)
Enterprise Security: A Data-Centric Approach to Securing the Enterprise, (Paperback) $48.29
$4829current price $48.29Enterprise Security: A Data-Centric Approach to Securing the Enterprise, (Paperback)
Software Security: Concepts & Practices, (Paperback) $63.99
$6399current price $63.99Software Security: Concepts & Practices, (Paperback)
Routledge Studies in Crime, Security and The Algorithmic Society: Technology, Power, and Knowledge, (Paperback) $55.99
$5599current price $55.99Routledge Studies in Crime, Security and The Algorithmic Society: Technology, Power, and Knowledge, (Paperback)
Addison-Wesley Professional Computing Advanced Programming in the UNIX Environment, (Paperback) $41.49
$4149current price $41.49Addison-Wesley Professional Computing Advanced Programming in the UNIX Environment, (Paperback)
Helm for Kubernetes Deployment: Definitive Reference for Developers and Engineers, (Paperback) $39.99
$3999current price $39.99Helm for Kubernetes Deployment: Definitive Reference for Developers and Engineers, (Paperback)
Pre-Owned Current Protocols Essential Laboratory Techniques Paperback $51.93
$5193current price $51.93Pre-Owned Current Protocols Essential Laboratory Techniques Paperback
Cyber Shorts Security Technologies for Law Enforcement Agencies, (Hardcover) $68.99
$6899current price $68.99Cyber Shorts Security Technologies for Law Enforcement Agencies, (Hardcover)
Enterprise DevOps for Architects: Leverage AIOps and DevSecOps for secure digital transformation, (Paperback) $54.29
$5429current price $54.29Enterprise DevOps for Architects: Leverage AIOps and DevSecOps for secure digital transformation, (Paperback)
Learning Engineering for Online Education: Theoretical Contexts and Design-Based Examples, (Paperback) $47.99
$4799current price $47.99Learning Engineering for Online Education: Theoretical Contexts and Design-Based Examples, (Paperback)
Software Quality: Theory and Management (3rd edition), (Paperback) $30.88
$3088current price $30.88Software Quality: Theory and Management (3rd edition), (Paperback)
Redefining Information Security: How to Build a Security-Driven Organization, (Paperback) $40.49
$4049current price $40.49Redefining Information Security: How to Build a Security-Driven Organization, (Paperback)
SOA Patterns with BizTalk Server 2013 - Second Edition, (Paperback) $46.57
$4657current price $46.57SOA Patterns with BizTalk Server 2013 - Second Edition, (Paperback)
SOFTWARE ENGINEERING ESSENTIALS, Volume I: The Development Process (Paperback) $44.71
$4471current price $44.71SOFTWARE ENGINEERING ESSENTIALS, Volume I: The Development Process (Paperback)
Information Security: Strategic Planning for Schools, (Paperback) $23.40 Was $26.99
$2340current price $23.40, Was $26.99$26.99Information Security: Strategic Planning for Schools, (Paperback)
Customer ratings & reviews
0 ratings|0 reviews
This item does not have any reviews yet
Related pages
- Hacking Softwares
- Pc Maintenance
- Database Warehousing
- General Software Development & Engineering Books
- Viruses & Malware Books
- Azure Infrastructure
- Azure Kubernetes Services
- Firewalls Policies
- Collaboration Software Books
- Software Development & Engineering Tools Books
- Windows Administration Books
- Project Management Software Books

